Home icon Chevron Chevron Blog Chevron News Chevron

PoC Released for Fortinet Vulnerability CVE-2025-3275

PoC Released for Fortinet Vulnerability CVE-2025-3275

May 23, 2025


FortinGuard Labs issued an advisory for CVE-2025-32756, a critical vulnerability affecting multiple Fortinet products. Just a day later, CVE-2025-32756 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. Today researchers at Horizon3.ai released a proof-of-concept (PoC) demonstrating exploitation of the vulnerability. Their analysis focused on comparing the patched and unpatched versions of FortiMail.

CVE-2025-32756

According to the advisory, CVE-2025-32756 is a stack-based buffer overflow within the administrative API that allows unauthenticated remote code execution. The vulnerability stems from improper handling of user-supplied data in the AuthHash field of a cookie named APSCOOKIE.

Proof-of-concept (PoC) for CVE-2025-32756

Horizon3.ai started their research using the IOC provided in the advisory and confirmed admin.fe CGI binary is the exploitation target.

While the admin.fe binary remained identical across both versions, further investigation revealed that the issue resides in a shared library: libhttputil.so. A significant clue was the presence of cookie fields (Era, Payload, AuthHash) found only in this library.

     Ghidra Imports View(Source: Horizon3.ai)

Using tools like Ghidra, Horizon3.ai tracked the vulnerability to a function named cookieval_unwrap(), which decodes base64-encoded fields. The unpatched version lacks bounds checking for the decoded size of AuthHash, leading to a classic buffer overflow. The patched version introduces a check to ensure the input length is below a safe threshold (less than 30 bytes).

The overflow allows overwriting several stack variables, including saved registers and the return address. This enables precise control over program execution. By supplying a crafted base64-encoded string, the researchers were able to trigger the overflow and hijack execution.

Notably, the web server configuration and its use of mod_fcgid make this vulnerability easier to exploit reliably, as failed attempts are less likely to crash the application.

Conclusion

While Horizon3.ai did not publish a full exploit, their findings highlight the high exploitability of CVE-2025-32756 and underscore the urgent need to patch.

Given the nature of the vulnerability and the availability of a PoC, organizations using affected Fortinet products should update immediately and monitor for signs of compromise.

Source: hxxps[://]horizon3[.]ai/attack-research/attack-blogs/cve-2025-32756-low-rise-jeans-are-back-and-so-are-buffer-overflows/

Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news

Did you like the post? Share it in your media

Latest Articles

Featured

India’s Cybersecurity Spending Expected to Reach $3.4 Billion by 2026 as AI-Powered Cyber Threats Continue to Grow

March 10, 2026 · Chetna Sehgal

India’s cybersecurity spending is expected to grow significantly as organizations face more adv...

Read More >
Featured

Malicious Chrome Extension Discovered After Developer Ownership Transfer

March 09, 2026 · Chetna Sehgal

Cybersecurity researchers have recently discovered a serious security issue involving a Google Ch...

Read More >
Featured

Web Server Exploits and Mimikatz Used in Cyberattacks Targeting Asian Critical Infrastructure

March 09, 2026 · Chetna Sehgal

Cybersecurity researchers recently discovered a new cyberattack campaign targeting critical infra...

Read More >
Featured

Iran-Linked MuddyWater Hackers Deploy New “Dindoor” Backdoor to Target U.S. Networks

March 06, 2026 · Chetna Sehgal

Cybersecurity researchers have recently uncovered a new cyber campaign linked to the Iranian hack...

Read More >
Featured

Microsoft Warns of ClickFix Attack Using Windows Terminal to Deploy Lumma Stealer

March 06, 2026 · Chetna Sehgal

Microsoft has recently revealed details about a new cyberattack campaign that is using a social-e...

Read More >
Featured

Global Operation Shuts Down Tycoon 2FA Phishing Service Behind 64,000 Attacks

March 05, 2026 · Chetna Sehgal

A major international law-enforcement operation has shut down Tycoon 2FA, a phishing-as-a-service...

Read More >
Newsletter line